Security watchdogs are now worried about a new attack vendor that cybercriminals could take advantage of – the growing number of devices that routinely use the Internet to function. Machine-to-machine (M2M) security is closely ...
Tags: security watchdogs, attack vendor, cybercriminals, M2M
Today’s mobile spam and phishing attacks will increasingly delivered by mobile malware networks, despite mobile device operating systems being more secure than those of desktop or laptop computers, a report has found. Blue Coat ...
Tags: mobile spam, mobile, malware networks
Financial malware authors are returning to traditional, phishing-like, credential-stealing techniques in order to evade detection, according to researchers from security firm Trusteer. Most financial Trojan programs used by cybercriminals ...
Tags: Financial malware, credential-stealing techniques, detection
Microsoft and Symantec on Wednesday announced that they have dismantled a botnet that took over millions of computers for criminal activities such as identity theft and click fraud. The Bamital botnet threatened the $12.7 billion online ...
Enterprise security managers have yet another worry to add to their list: cyberwarfare attacks. Now, in addition to guarding against targeted attacks from cybercriminals and activists, enterprise security managers must increasingly guard ...
Cloud hosting company FireHost has claimed that cross-site scripting attacks increased by an estimated 160 per cent in the final quarter of 2012. The company claims that it has detected a spike in what it calls a "superfecta" of attempted ...
Many of the domain names used by a cybercriminal gang to control computers infected with the Virut malware were disabled last week in a coordinated takedown effort, Spamhaus, an organization dedicated to fighting spam, announced Saturday. ...
Trend Micro has spotted a piece of malicious software that masquerades as the latest patch for Java, a typically opportunistic move by hackers. Oracle released two emergency patches on Sunday for its Java programming language and ...
Tags: Trend Micro, malicious software, Java
Researchers from Security Explorations, a Poland-based vulnerability research firm, claim to have found two new vulnerabilities in Java 7 Update 11 that can be exploited to bypass the software's security sandbox and execute arbitrary code ...
The Virut botnet suffered a major setback last week, after it was announced that many of the domain names used by a cybercriminal gang to control computers infected with the malware had been disabled. This was the result of coordinated ...
Foxit released version 5.4.5 of its Foxit Reader PDF viewer plug-in on Thursday in order to address a critical remote code execution vulnerability that could have allowed attackers to compromise computers running previous versions of the ...
Tags: Foxit, Foxit Reader PDF viewer, computer, software
Researchers from a Poland-based vulnerability research firm on Friday announced that they had found vulnerabilities in Java 7 Update 11 that can be exploited to bypass the software’s security sandbox and execute arbitrary code on ...
Tags: Researchers, Java, Security Flaw
The European Cybercrime Centre (EC3) will help provide tools to governments and businesses to better protect themselves online. The EC3 will focus on illegal online activities by organised crime groups and will place a significant amount ...
Tags: European Cybercrime Centre, illegal online activities, e-banking attacks
Internet users should consider disabling Java in their browsers because of an exploit that can allow remote attackers to execute code on a vulnerable system, the U.S. Computer Emergency Readiness Team (US-CERT) recommended late Thursday. ...
Tags: Internet user, Java, vulnerable system
A built-in PDF viewer component based on JavaScript and HTML5 Web technologies has been added to the beta version of Firefox 19, Mozilla said Friday. The browser maker described the built-in PDF viewer as more secure and safer than ...
Tags: Firefox 19, Mozilla, browser